1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
7

The HTTP protocol operates at which layer?

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer:

transport

Explanation:

taking you to what ever website you want

You might be interested in
List any two characteristics of ASCC.​
ladessa [460]

Answer:

spirit of cooperation, collective responsibility

Explanation:

i had that question before

3 0
3 years ago
Read 2 more answers
During wave motion, the motion of particles to one side of the rest position will be______ the motion to the other side of the r
DiKsa [7]
I think waves will be the same as the motion because their all going the same way if not im sorry and take the test again and pick b
5 0
3 years ago
Read 2 more answers
Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forest
sasho [114]

Answer:

​AD DS

Explanation:

Active Directory Domain Service is an active directory server role found in windows server and it permits admins in a network environment store and also manages information from a particular source in a network, there are no requirements for forests, domains, and domain controllers. It works both on intranet and internet networks.

3 0
4 years ago
The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated
kirill115 [55]

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

7 0
4 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • Will upvote!
    12·1 answer
  • When advising a customer on the purchase of a new power supply, you should explain that if the power supply runs at peak perform
    9·1 answer
  • Which are the two alternatives for pasting copied data in a target cell or a group of cells ?
    13·2 answers
  • In the 219th meeting of the American Astronomical Society, what planet's borders were said to be recognizable from space? Hint:
    12·1 answer
  • Which of the following is the best subject line for an e-mail sent to co-workers about rescheduling a team meeting? A. Reschedul
    12·2 answers
  • Little circles located in front of various website screen options, which can be selected with the mouse, are called ________.
    6·1 answer
  • What is the maximum duration of daily scrum meetings A:15minsB:45minsC10mins:30mins
    7·2 answers
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • 2
    15·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!